Lucene search

K
nessusThis script is Copyright (C) 2015-2022 Tenable Network Security, Inc.SOLARIS11_FETCHMAIL_20121016.NASL
HistoryJan 19, 2015 - 12:00 a.m.

Oracle Solaris Third-Party Patch Update : fetchmail (multiple_vulnerabilities_in_fetchmail) (BEAST)

2015-01-1900:00:00
This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.
www.tenable.com
13

The remote Solaris system is missing necessary patches to address security updates :

  • The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a ‘BEAST’ attack. (CVE-2011-3389)

  • Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    (CVE-2012-3482)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Oracle Third Party software advisories.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(80605);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");

  script_cve_id("CVE-2011-3389", "CVE-2012-3482");
  script_xref(name:"CEA-ID", value:"CEA-2019-0547");

  script_name(english:"Oracle Solaris Third-Party Patch Update : fetchmail (multiple_vulnerabilities_in_fetchmail) (BEAST)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Solaris system is missing a security patch for third-party
software.");
  script_set_attribute(attribute:"description", value:
"The remote Solaris system is missing necessary patches to address
security updates :

  - The SSL protocol, as used in certain configurations in
    Microsoft Windows and Microsoft Internet Explorer,
    Mozilla Firefox, Google Chrome, Opera, and other
    products, encrypts data by using CBC mode with chained
    initialization vectors, which allows man-in-the-middle
    attackers to obtain plaintext HTTP headers via a
    blockwise chosen-boundary attack (BCBA) on an HTTPS
    session, in conjunction with JavaScript code that uses
    (1) the HTML5 WebSocket API, (2) the Java URLConnection
    API, or (3) the Silverlight WebClient API, aka a 'BEAST'
    attack. (CVE-2011-3389)

  - Fetchmail 5.0.8 through 6.3.21, when using NTLM
    authentication in debug mode, allows remote NTLM servers
    to (1) cause a denial of service (crash and delayed
    delivery of inbound mail) via a crafted NTLM response
    that triggers an out-of-bounds read in the base64
    decoder, or (2) obtain sensitive information from memory
    via an NTLM Type 2 message with a crafted Target Name
    structure, which triggers an out-of-bounds read.
    (CVE-2012-3482)");
  # https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4a913f44");
  # https://blogs.oracle.com/sunsecurity/multiple-vulnerabilities-in-fetchmail
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?90390bc0");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Solaris 11/11 SRU 12.4.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P");
  script_set_attribute(attribute:"in_the_news", value:"true");

  script_set_attribute(attribute:"patch_publication_date", value:"2012/10/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/19");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:fetchmail");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Solaris Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release", "Host/Solaris11/pkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("solaris.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Solaris11/release");
if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");
pkg_list = solaris_pkg_list_leaves();
if (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, "Solaris pkg-list packages");

if (empty_or_null(egrep(string:pkg_list, pattern:"^fetchmail$"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "fetchmail");

flag = 0;

if (solaris_check_release(release:"0.5.11-0.175.0.12.0.4.0", sru:"SRU 12.4") > 0) flag++;

if (flag)
{
  error_extra = 'Affected package : fetchmail\n' + solaris_get_report2();
  error_extra = ereg_replace(pattern:"version", replace:"OS version", string:error_extra);
  if (report_verbosity > 0) security_warning(port:0, extra:error_extra);
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_PACKAGE_NOT_AFFECTED, "fetchmail");
VendorProductVersionCPE
oraclesolaris11.0cpe:/o:oracle:solaris:11.0
oraclesolarisfetchmailp-cpe:/a:oracle:solaris:fetchmail